267.
|
A Security Analysis of the IEEE 1588 Standard
/ Jeanette Tsang ; Konstantin Beznosov
[TEST-PRESENTATION-2005-001]
Published in Jeanette Tsang, Konstantin Beznosov, "A Security Analysis of the IEEE 1588 Standard", presented at the 2005 Conference on IEEE-1588 Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems, October 2005.:
Transfer from CDS 0.99.7: PDF;
|
268.
|
On the Benefits of Decomposing Policy Engines into Components
/ Konstantin Beznosov
[TEST-ARTICLE-2005-004]
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. [...]
Published in Konstantin Beznosov. Flooding and recycling authorizations. In Proceedings of the New
Security Paradigms Workshop (NSPW’05), pages 67–72, Lake Arrowhead, CA, USA, 20-23
September 2005. ACM Press.
:
Transfer from CDS 0.99.7: PDF;
|
269.
|
Flooding and Recycling Authorizations
/ Konstantin Beznosov
[TEST-ARTICLE-2005-003]
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers through remote procedure calls. [...]
Published in Konstantin Beznosov, "Flooding and Recycling Authorizations", in Proceedings of New Security Paradigms Workshop (NSPW), Lake Arrowhead, CA, USA, ACM, 20-23 September, 2005, pp.67-72.:
Transfer from CDS 0.99.7: PDF;
|